In CWP (aka Control Web Panel or CentOS Web Panel) before 0.9.8.1107, an unauthenticated attacker can use %00 bytes to cause /user/loader.php to register an arbitrary API key, as demonstrated by a /user/loader.php?api=1&scripts= .%00./.%00./api/account_new_create&acc=guadaapi URI. Any number of %00 instances can be used, e.g., .%00%00%00./.%00%00%00./api/account_new_create could also be used for the scripts parameter.
History

Sat, 12 Apr 2025 00:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-862
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-04-12T00:06:13.609Z

Reserved: 2021-12-23T00:00:00.000Z

Link: CVE-2021-45467

cve-icon Vulnrichment

Updated: 2024-08-04T04:39:21.084Z

cve-icon NVD

Status : Modified

Published: 2022-12-26T05:15:10.867

Modified: 2025-04-12T01:15:14.540

Link: CVE-2021-45467

cve-icon Redhat

No data.